Cmc-computers Materials & Continua最新文献

筛选
英文 中文
Secure and Robust Optical Multi-Stage Medical Image Cryptosystem 安全鲁棒的光学多级医学图像密码系统
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.018545
W. El-shafai, M. Aly, A. Algarni, F. El-Samie, N. Soliman
{"title":"Secure and Robust Optical Multi-Stage Medical Image Cryptosystem","authors":"W. El-shafai, M. Aly, A. Algarni, F. El-Samie, N. Soliman","doi":"10.32604/cmc.2022.018545","DOIUrl":"https://doi.org/10.32604/cmc.2022.018545","url":null,"abstract":": Due to the rapid growth of telemedicine and healthcare services, color medical image security applications have been expanded precipitously. In this paper, an asymmetric PTFrFT (Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested. Two different phases in the fractional Fourier and output planes are provided as deciphering keys. Accordingly, the ciphering keys will not be employed for the deciphering procedure. Thus, the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH (Optical Scanning Holography) and DRPE (Double Random Phase Encoding) algorithms. One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the one-dimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components. More comparisons on various color medical images are examined and analyzed to substanti-ate the cryptosystem efficacy. The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure. It has terrific cryptography performance compared to conventional cryptography algorithms, even in the presence of noise and severe channel attacks.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"35 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78866022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design of an Information Security Service for Medical Artificial Intelligence 医疗人工智能信息安全服务的设计
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.015610
Yanghoon Kim, Jawon Kim, Hangbae Chang
{"title":"Design of an Information Security Service for Medical Artificial Intelligence","authors":"Yanghoon Kim, Jawon Kim, Hangbae Chang","doi":"10.32604/cmc.2022.015610","DOIUrl":"https://doi.org/10.32604/cmc.2022.015610","url":null,"abstract":": The medical convergence industry has gradually adopted ICT devices, which has led to legacy security problems related to ICT devices. However, it has been difficult to solve these problems due to data resource issues. Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information. Therefore, to provide reliableservices focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system. This study proposes the use of system identification and countermeasures to secure system reliability when using medical convergence environment informationin medical artificial intelligence. We checked the life cycle of medical information and the flow and location of information, analyzed the security threats that may arise during the life cycle, and proposed technical countermeasures to overcome such threats. We verified the proposed countermeasures through a survey of experts. Security requirements were defined based on the information life cycle in the medical convergence environment. We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"29 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78953146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cluster-Based Stable BSM Dissemination System for Safe Autonomous Platooning 基于集群的安全自主队列稳定BSM传播系统
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.021237
Sagheer Abbas, Yousef Alhwaiti, A. Fatima, M. A. Khan, Muhammad Adnan Khan, Taher M. Ghazal, Asma Kanwal, Munir Ahmad, Nouh Sabri Elmitwally
{"title":"Cluster-Based Stable BSM Dissemination System for Safe Autonomous Platooning","authors":"Sagheer Abbas, Yousef Alhwaiti, A. Fatima, M. A. Khan, Muhammad Adnan Khan, Taher M. Ghazal, Asma Kanwal, Munir Ahmad, Nouh Sabri Elmitwally","doi":"10.32604/cmc.2022.021237","DOIUrl":"https://doi.org/10.32604/cmc.2022.021237","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"13 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79022672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved KNN Imputation for Missing Values in Gene Expression Data 基因表达数据缺失值的改进KNN代入
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.020261
Phimmarin Keerin, Tossapon Boongoen
{"title":"Improved KNN Imputation for Missing Values in Gene Expression Data","authors":"Phimmarin Keerin, Tossapon Boongoen","doi":"10.32604/cmc.2022.020261","DOIUrl":"https://doi.org/10.32604/cmc.2022.020261","url":null,"abstract":"The problem of missing values has long been studied by researchers working in areas of data science and bioinformatics, especially the analysis of gene expression data that facilitates an early detection of cancer. Many attempts show improvements made by excluding samples with missing information from the analysis process, while others have tried to fill the gaps with possible values. While the former is simple, the latter safeguards information loss. For that, a neighbour-based (KNN) approach has proven more effective than other global estimators. The paper extends this further by introducing a new summarizationmethod to theKNNmodel. It is the first study that applies the concept of ordered weighted averaging (OWA) operator to such a problem context. In particular, two variations of OWA aggregation are proposed and evaluated against their baseline and other neighbor-based models. Using different ratios of missing values from 1%–20% and a set of six published gene expression datasets, the experimental results suggest that newmethods usually provide more accurate estimates than those compared methods. Specific to the missing rates of 5% and 20%, the best NRMSE scores as averages across datasets is 0.65 and 0.69, while the highest measures obtained by existing techniques included in this study are 0.80 and 0.84, respectively.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"1 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76532644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Autism Spectrum Disorder Prediction by an Explainable Deep Learning Approach 基于可解释深度学习方法的自闭症谱系障碍预测
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.022170
Jasmin Pamela S, R. Saranya, V. Indragandhi, R. Raja Singh, V. Subramaniyaswamy, Yuvaraja Teekaraman, S. Urooj, N. Alwadai
{"title":"Autism Spectrum Disorder Prediction by an Explainable Deep Learning Approach","authors":"Jasmin Pamela S, R. Saranya, V. Indragandhi, R. Raja Singh, V. Subramaniyaswamy, Yuvaraja Teekaraman, S. Urooj, N. Alwadai","doi":"10.32604/cmc.2022.022170","DOIUrl":"https://doi.org/10.32604/cmc.2022.022170","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"118 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77390388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design of Human Adaptive Mechatronics Controller for Upper Limb Motion Intention Prediction 面向上肢运动意图预测的人体自适应机电控制器设计
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.021667
Sunwoo Hwang, Joo-Uk Kim, Hagseoung Kim, Hyungchul Kim, Youngmin Kim
{"title":"Design of Human Adaptive Mechatronics Controller for Upper Limb Motion Intention Prediction","authors":"Sunwoo Hwang, Joo-Uk Kim, Hagseoung Kim, Hyungchul Kim, Youngmin Kim","doi":"10.32604/cmc.2022.021667","DOIUrl":"https://doi.org/10.32604/cmc.2022.021667","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"33 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79085807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of PCCNN-Based Network Intrusion Detection System for EDGE Computing 基于pccnn的边缘计算网络入侵检测系统的开发
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.018708
Kamaledin Abodayeh, A. Raza, Muhammad Rafiq, Muhammad Shoaib Arif, Muhammad Naveed, Zunir Zeb, Syed Zaheer Abbas, K. Shahzadi, S. Sarwar, Qasim Naveed, Badar Ul Zaman, Muhammad Mohsin
{"title":"Development of PCCNN-Based Network Intrusion Detection System for EDGE Computing","authors":"Kamaledin Abodayeh, A. Raza, Muhammad Rafiq, Muhammad Shoaib Arif, Muhammad Naveed, Zunir Zeb, Syed Zaheer Abbas, K. Shahzadi, S. Sarwar, Qasim Naveed, Badar Ul Zaman, Muhammad Mohsin","doi":"10.32604/cmc.2022.018708","DOIUrl":"https://doi.org/10.32604/cmc.2022.018708","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"46 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79254994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Blockchain Based Secured Load Balanced Task Scheduling Approach for Fitness Service 基于区块链的健身服务安全负载均衡任务调度方法
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.019534
Muhammad Ibrahim, Faisal Jamil, Yunjung Lee, Dohyeun Kim
{"title":"Blockchain Based Secured Load Balanced Task Scheduling Approach for Fitness Service","authors":"Muhammad Ibrahim, Faisal Jamil, Yunjung Lee, Dohyeun Kim","doi":"10.32604/cmc.2022.019534","DOIUrl":"https://doi.org/10.32604/cmc.2022.019534","url":null,"abstract":": In recent times, the evolution of blockchain technology has got huge attention from the research community due to its versatile applications and unique security features. The IoT has shown wide adoption in various applications including smart cities, healthcare, trade, business, etc. Among these applications, fitness applications have been widely considered for smart fitness systems. The users of the fitness system are increasing at a high rate thus the gym providers are constantly extending the fitness facilities. Thus, scheduling such a huge number of requests for fitness exercise is a big challenge. Secondly, the user fitness data is critical thus securing the user fitness data from unauthorized access is also challenging. To overcome these issues, this work proposed a blockchain-based load-balanced task scheduling approach. A thorough analysis has been performed to investigate the applications of IoT in the fitness industry and various scheduling approaches. The proposed scheduling approach aims to schedule the requests of the fitness users in a load-balanced way that maximize the acceptance rate of the users’ requests and improve resource utilization. The performance of the proposed task scheduling approach is compared with the state-of-the-art approaches concerning the average resource utilization and task rejection ratio. The obtained results confirm the efficiency of the proposed scheduling approach. For investigating the performance of the blockchain, various experiments are performed using the Hyperledger Caliper concerning latency, throughput, resource utilization. The Solo approach has shown an improvement of 32% and 26% in throughput as compared to Raft and Solo-Raft approaches respectively. The obtained results assert that the proposed architecture is applicable for resource-constrained IoT applications and is extensible for different IoT applications.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"231 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86690750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Unprecedented Smart Algorithm for Uninterrupted SDN Services During DDoS Attack 前所未有的DDoS攻击下SDN不间断服务智能算法
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.018505
M. R. Haque, S. C. Tan, Z. Yusoff, K. Nisar, R. Kaspin, Iram Haider, Sana Nisar, J. Rodrigues, B. S. Chowdhry, M. A. Uqaili, Satya Prasad Majumder, D. Rawat, Richard Etengu, R. Buyya
{"title":"Unprecedented Smart Algorithm for Uninterrupted SDN Services During DDoS Attack","authors":"M. R. Haque, S. C. Tan, Z. Yusoff, K. Nisar, R. Kaspin, Iram Haider, Sana Nisar, J. Rodrigues, B. S. Chowdhry, M. A. Uqaili, Satya Prasad Majumder, D. Rawat, Richard Etengu, R. Buyya","doi":"10.32604/cmc.2022.018505","DOIUrl":"https://doi.org/10.32604/cmc.2022.018505","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"61 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86990797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
IoT Devices Authentication Using Artificial Neural Network 使用人工神经网络的物联网设备认证
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.020624
Syed Shabih Hasan, Anwar Ghani, I. Din, Ahmad S. Almogren, Ayman Altameem
{"title":"IoT Devices Authentication Using Artificial Neural Network","authors":"Syed Shabih Hasan, Anwar Ghani, I. Din, Ahmad S. Almogren, Ayman Altameem","doi":"10.32604/cmc.2022.020624","DOIUrl":"https://doi.org/10.32604/cmc.2022.020624","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"9 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87052193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信